Skip to main content

CVE-2022-49321: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49321cvecve-2022-49321
Published: Wed Feb 26 2025 (02/26/2025, 02:10:46 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: treat all calls not a bcall when bc_serv is NULL When a rdma server returns a fault format reply, nfs v3 client may treats it as a bcall when bc service is not exist. The debug message at rpcrdma_bc_receive_call are, [56579.837169] RPC: rpcrdma_bc_receive_call: callback XID 00000001, length=20 [56579.837174] RPC: rpcrdma_bc_receive_call: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 After that, rpcrdma_bc_receive_call will meets NULL pointer as, [ 226.057890] BUG: unable to handle kernel NULL pointer dereference at 00000000000000c8 ... [ 226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20 ... [ 226.059732] Call Trace: [ 226.059878] rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma] [ 226.060011] __ib_process_cq+0x89/0x170 [ib_core] [ 226.060092] ib_cq_poll_work+0x26/0x80 [ib_core] [ 226.060257] process_one_work+0x1a7/0x360 [ 226.060367] ? create_worker+0x1a0/0x1a0 [ 226.060440] worker_thread+0x30/0x390 [ 226.060500] ? create_worker+0x1a0/0x1a0 [ 226.060574] kthread+0x116/0x130 [ 226.060661] ? kthread_flush_work_fn+0x10/0x10 [ 226.060724] ret_from_fork+0x35/0x40 ...

AI-Powered Analysis

AILast updated: 06/30/2025, 05:54:45 UTC

Technical Analysis

CVE-2022-49321 is a vulnerability identified in the Linux kernel's handling of Remote Direct Memory Access (RDMA) transport for the Network File System (NFS) version 3 protocol, specifically within the xprtrdma module. The vulnerability arises when the RDMA server returns a fault format reply, but the NFSv3 client incorrectly treats this reply as a callback (bcall) despite the absence of a bc_serv (callback service). This misinterpretation leads to the rpcrdma_bc_receive_call function dereferencing a NULL pointer, causing a kernel NULL pointer dereference and resulting in a kernel crash (BUG). The kernel panic is triggered during the execution of the _raw_spin_lock function, as indicated by the call trace, which includes rpcrdma_bc_receive_call and ib_core module functions. This vulnerability can cause a denial of service (DoS) by crashing the affected Linux kernel, disrupting services relying on NFS over RDMA. The issue is rooted in improper validation of callback service presence before processing RDMA replies, leading to unsafe memory access. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and no known exploits have been reported in the wild as of the publication date (February 26, 2025). No CVSS score has been assigned to this vulnerability yet.

Potential Impact

For European organizations, the impact of CVE-2022-49321 can be significant, especially for those relying on Linux servers using NFSv3 over RDMA for high-performance networked storage. The vulnerability can lead to kernel crashes, causing service interruptions and potential data availability issues. This is particularly critical for enterprises in sectors such as finance, telecommunications, research institutions, and cloud service providers that depend on stable and performant NFS storage solutions. The denial of service caused by this vulnerability could disrupt business operations, lead to downtime, and require emergency patching or system reboots, impacting operational continuity. Although no direct data breach or privilege escalation is indicated, repeated crashes could increase the risk of data corruption or loss in unstable environments. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, especially targeting high-value infrastructure in Europe.

Mitigation Recommendations

To mitigate CVE-2022-49321, European organizations should: 1) Identify and inventory Linux systems using NFSv3 over RDMA, focusing on those running affected kernel versions (notably those around the commit 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2). 2) Apply the latest Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted Linux distributions or upstream kernel sources. 3) If immediate patching is not feasible, consider disabling RDMA transport for NFS or fallback to TCP transport temporarily to avoid triggering the vulnerable code path. 4) Monitor kernel logs for messages related to rpcrdma_bc_receive_call or unexpected kernel panics indicative of exploitation attempts. 5) Implement robust system monitoring and alerting to detect and respond to kernel crashes promptly. 6) Engage with Linux distribution security advisories and subscribe to vulnerability feeds to stay informed about patch releases and exploit developments. 7) Test patches in controlled environments before deployment to ensure stability and compatibility with existing workloads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.537Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe565c

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 5:54:45 AM

Last updated: 8/12/2025, 5:39:13 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats